Download Presentation

IP Security

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

Basic Objective: Secure IP

IP-Level Security

Authentication: insures that the received packet was transmitted by the party identified in the header.

Confidentiality: Enables communicating nodes to encrypt messages.

Key management: secure key exchange.

An Overview of IP

Internet Protocol (IP):

“Provides the facilities for inter-connecting end systems across multiple networks.”

Implemented in:

Each end system and

Routers of the networks.

Routers must cope with heterogeneous networks.

Overview of IP

IP provides unreliable service.

No guarantee that all data packets will be delivered.

Delivered packets may arrive in wrong order.

Higher layer (TCP) must recover from any errors.

Provides great deal of flexibility:

No reliability requirements of subnets.

Packets can follow different paths.

An Overview of IP

Operation of IP:

//The next slides shows the architecture of TCP/IP suite.//

Example:

“End system X wants to send a data packet to end system Y.”

TCP/IP Example

IP Security Overview

IPSec provides a set of security algorithms plus a general framework that allows a pair of communicating entities to use whichever algorithms provide security appropriate for the communication.

Applications of IPSec

Secure branch office connectivity over the Internet: A company can build a secure virtual private network over the Internet or over a public WAN. This enables a business to rely heavily on the Internet and reduce its need for private networks, saving costs and network management overhead.

Secure remote access over the Internet: An end user whose system is equipped with IP security protocols can make a local call to an Internet Service Provider (ISP) and gain secure access to a company network. This reduces the cost of toll charges for traveling employees and telecommuters.

Application of IPSec

Establishment of extranet and intranet connectivity with partners: IPSec can be used to secure communication with other organizations, ensuring authentication and confidentiality and providing a key exchange mechanism.

Enhancement of electronic commerce security: Most efforts to date to secure electronic commerce on the Internet have relied upon securing Web traffic with SSL since that is commonly found in Web browsers and is easy to set up and run. There are new proposals that may utilize IPSec for electronic commerce.